Skip to main content

Home/ Socialism and the End of the American Dream/ Group items matching "Library-of-Congress" in title, tags, annotations or url

Group items matching
in title, tags, annotations or url

Sort By: Relevance | Date Filter: All | Bookmarks | Topics Simple Middle
Paul Merrell

The Only Thing We Have to Fear Is -- The CIA | War Is A Crime .org - 0 views

  • Fifty years ago, exactly one month after John Kennedy was killed, the Washington Post published an op-ed titled “Limit CIA Role to Intelligence.” The first sentence of that op-ed on Dec. 22, 1963, read, “I think it has become necessary to take another look at the purpose and operations of our Central Intelligence Agency.” It sounded like the intro to a bleat from some liberal professor or journalist. Not so. The writer was former President Harry S. Truman, who spearheaded the establishment of the CIA 66 years ago, right after World War II, to better coordinate U.S. intelligence gathering. But the spy agency had lurched off in what Truman thought were troubling directions.
  • Is this why the President feels he cannot fire his clumsily devious Director of National Intelligence James Clapper, who had to apologize to Congress for giving “clearly erroneous” testimony in March? Is this why he allows National Security Agency Director Keith Alexander and counterparts in the FBI to continue to mislead the American people, even though the intermittent snow showers from Snowden show our senior national security officials to have lied — and to have been out of control? This may be small solace to President Obama, but there is no sign that the NSA documents that Snowden’s has released include the Senate Intelligence Committee’s 6,300-page report on CIA torture. Rather, that report, at least, seems sure to be under Obama’s and Senate Intelligence Committee chair Dianne Feinstein’s tight control.
  • But Kennedy stuck to his guns, so to speak. He fired Dulles and his co-conspirators a few months after the abortive invasion, and told a friend that he wanted to “splinter the CIA into a thousand pieces and scatter it into the winds.” The outrage was very obviously mutual.
  • ...11 more annotations...
  • Truman concluded the op-ed with an admonition that was as clear as the syntax was clumsy: “I would like to see the CIA restored to its original assignment as the intelligence arm of the President, and that whatever else it can properly perform in that special field – and that its operational duties be terminated or properly used elsewhere.” The importance and prescient nature of that admonition are even clearer today, a half-century later.
  • After Kennedy was murdered in Dallas, the patrician, well-connected Dulles got himself appointed to the Warren Commission and took the lead in shaping the investigation of JFK’s assassination. Documents in the Truman Library show that Dulles also mounted a small domestic covert action of his own to neutralize any future airing of Truman’s and Souers’s warnings about covert action.
  • As the de facto head of the Warren Commission, Dulles was perfectly positioned to protect himself and his associates, were any commissioners or investigators — or journalists — tempted to question whether Dulles and the CIA played a role in killing Kennedy. And so, the question: Did Allen Dulles and other “cloak-and-dagger” CIA operatives have a hand in John Kennedy’s assassination and in then covering it up? In my view, the best dissection of the evidence pertaining to the murder appeared in James Douglass’s 2008 book, JFK and the Unspeakable. After updating and arraying the abundant evidence, and conducting still more interviews, Douglass concludes that the answer is Yes.
  • The mainstream media had an allergic reaction to Douglass’s book and gave it almost no reviews. It is, nevertheless, still selling well. And, more important, it seems a safe bet that President Barack Obama knows what it says and maybe has even read it. This may go some way toward explaining why Obama has been so deferential to the CIA, NSA, FBI and the Pentagon. Could this be at least part of the reason he felt he had to leave the Cheney/Bush-anointed torturers, kidnappers and black-prison wardens in place, instructing his first CIA chief Leon Panetta to become, in effect, the agency’s lawyer rather than leader.
  • Sadly, those concerns that Truman expressed in that op-ed — that he had inadvertently helped create a Frankenstein monster — are as valid today as they were 50 years ago, if not more so.
  • But the timorous President has a big problem. He is acutely aware that, if released, the Senate committee report would create a firestorm – almost certainly implicating Obama’s CIA Director John Brennan and many other heavy-hitters of whom he appears to be afraid. And so Obama has allowed Brennan to play bureaucratic games, delaying release of the report for more than a year, even though its conclusions are said to closely resemble earlier findings of the CIA’s own Inspector General and the Constitution Project (see below).
  • Hat tip to the New Yorker’s Jane Mayer, who took the trouble to read the play-by-play of testimony to the Senate Intelligence Committee by former CIA General Counsel (2009-2013) Stephen W. Preston, nominated (and now confirmed) to be general counsel at the Department of Defense. Under questioning by Sen. Mark Udall, D-Colorado, Preston admitted outright that, contrary to the CIA’s insistence that it did not actively impede congressional oversight of its detention and interrogation program, “briefings to the committee included inaccurate information related to aspects of the program of express interest to Members.”
  • That “inaccurate information” apparently is thoroughly documented in the Senate Intelligence Committee report which, largely because of the CIA’s imaginative foot-dragging, cost taxpayers $40 million. Udall has revealed that the report (which includes 35,000 footnotes) contains a very long section titled “C.I.A. Representations on the C.I.A. Interrogation Program and the Effectiveness of the C.I.A.’s Enhanced Interrogation Techniques to Congress.” Preston also acknowledged that the CIA inadequately informed the Justice Department on interrogation and detention. He said, “CIA’s efforts fell well short of our current practices when it comes to providing information relevant to [the Office of Legal Counsel]’s legal analysis.”
  • As Katherine Hawkins, the senior investigator for last April’s bipartisan, independent report by the Constitution Project’s Task Force on Detainee Treatment, noted in an Oct. 18, 2013 posting, the memos from acting OLC chief, Steven Bradbury, relied very heavily on now-discredited CIA claims that “enhanced interrogation” saved lives, and that the sessions were carefully monitored by medical and psychological personnel to ensure that detainees’ suffering would not rise to the level of torture. According to Hawkins, Udall complained – and Preston admitted – that, in providing the materials requested by the committee, “the CIA removed several thousand CIA documents that the agency thought could be subjected to executive privilege claims by the President, without any decision by Obama to invoke the privilege.”
  • Worse still for the CIA, the Senate Intelligence Committee report apparently destroys the agency’s argument justifying torture on the grounds that there was no other way to acquire the needed information save through brutalization. In his answers to Udall, Preston concedes that, contrary to what the agency has argued, it can and has been established that legal methods of interrogation would have yielded the same intelligence. Is anyone still wondering why our timid President is likely to sit on the Senate Intelligence Committee report for as long as he can? Or why he will let John Brennan redact it to a fare-thee-well, if he is eventually forced to release some of it by pressure from folks who care about things like torture?
  • It does appear that the newly taciturn CIA Director Brennan has inordinate influence over the President in such matters – not unlike the influence that both DNI Clapper and NSA Director Alexander seem able to exert. In this respect, Brennan joins the dubious company of the majority of his predecessor CIA directors, as they made abundantly clear when they went to inordinate lengths to prevent their torturer colleagues from being held accountable. (Also, see “CIA Torturers Running Scared,” Sept. 20, 2009; or “Are Presidents Afraid of the CIA?” Dec. 29, 2009)
Paul Merrell

A Year After Reform Push, NSA Still Collects Bulk Domestic Data, Still Lacks Way to Assess Value - The Intercept - 0 views

  • The presidential advisory board on privacy that recommended a slew of domestic surveillance reforms in the wake of the Edward Snowden revelations reported today that many of its suggestions have been agreed to “in principle” by the Obama administration, but in practice, very little has changed. Most notably, the Privacy and Civil Liberties Oversight Board called attention to the obvious fact that one full year after it concluded that the government’s bulk collection of metadata on domestic telephone calls is illegal and unproductive, the program continues apace. “The Administration accepted our recommendation in principle. However, it has not ended the bulk telephone records program on its own, opting instead to seek legislation to create an alternative to the existing program,” the report notes.
  • And while Congress has variously debated, proposed, neutered, and failed to agree on any action, the report’s authors point the finger of blame squarely at President Obama. “It should be noted that the Administration can end the bulk telephone records program at any time, without congressional involvement,” the report says. Obama said a year ago that he favored an end to the government collection of those records if an alternative — such as keeping the records at the telephone companies, or with a third party — still allowed them to be searchable by the government. The White House was recently said to be “still considering” the matter. The board noted that Obama has accepted some, but not all, of the privacy safeguards it recommended — somewhat reducing the ease and depth with which National Security Agency agents can dig through the domestic data, but not, for instance, agreeing to delete the data after three years, instead of five.
  • But one recommendation in particular – that the intelligence community develop some sort of methodology to assess whether any of this stuff is actually doing any good — has been notably “not implemented.” “Determining the efficacy and value of particular counterterrorism programs is critical,” the board says. “Without such determinations, policymakers and courts cannot effectively weigh the interests of the government in conducting a program against the intrusions on privacy and civil liberties that it may cause.”
  • ...2 more annotations...
  • A year ago, the board also recommended that Congress enact legislation enabling the secretive Foreign Intelligence Surveillance Court, which currently approves both specific and blanket warrant applications without allowing anyone to argue otherwise, to hear independent views. It recommended more appellate reviews of that court’s rulings. There’s been no progress on either front. A year ago, the board recommended that “the scope of surveillance authorities affecting Americans should be public,” and that the intelligence community should “develop principles and criteria for the public articulation of the legal authorities under which it conducts surveillance affecting Americans.” Something is apparently brewing in that area, but it’s not entirely clear what. “Intelligence Community representatives have advised us that they are committed to implementing this recommendation,” with principles “that they will soon be releasing,” the report says.
  • The presidential advisory board on privacy that recommended a slew of domestic surveillance reforms in the wake of the Edward Snowden revelations reported today that many of its suggestions have been agreed to “in principle” by the Obama administration, but in practice, very little has changed. Most notably, the Privacy and Civil Liberties Oversight Board called attention to the obvious fact that one full year after it concluded that the government’s bulk collection of metadata on domestic telephone calls is illegal and unproductive, the program continues apace. “The Administration accepted our recommendation in principle. However, it has not ended the bulk telephone records program on its own, opting instead to seek legislation to create an alternative to the existing program,” the report notes.
Paul Merrell

Iran negotiations: Is bipartisan fear-mongering helpful? - DecodeDC Story - 0 views

  • Negotiations with Iran are nearing a potential finish line, and the public lobbying in the U.S. is getting louder.  But in a surprise twist, the worst behavior isn’t necessarily partisan.
  • Perhaps the most incendiary bit of propaganda so far was bipartisan. Two former Republican senators, Saxby Chambliss of Georgia and Norm Coleman of Minnesota, and a Democrat, former Indiana Senator Evan Bayh, want Congress to pass a bill that would require any treaty or deal with Iran to be approved by Congress.That’s a reasonable proposition well worth a good debate.But this bipartisan troika boosted their cause with an outrageous, fear-mongering ad. Take a look:
  •  
    Commercial featuring a van in an American city being blown up by an atomic bomb stowed in it. Actually, I worry more about the Israelis doing it than I do about Iran doing so; the Iranians don't have an A-bomb and have no plans to acquire one according to the consensus position of all intelligence agencies in the U.S., Mossad, and a couple of recent Israeli Defense Force chiefs. And the Izzies are way into false flag attacks.  See https://en.wikipedia.org/wiki/Lavon_Affair ("The Lavon Affair refers to a failed Israeli covert operation [because one of the bombs went off prematurely in an operative's pocket], code named Operation Susannah, conducted in Egypt in the Summer of 1954. As part of the false flag operation,[1] a group of Egyptian Jews were recruited by Israeli military intelligence to plant bombs inside Egyptian, American and British-owned civilian targets, cinemas, libraries and American educational centers."
Paul Merrell

Tomgram: Laura Gottesdiener, Security vs. Securities | TomDispatch - 0 views

  • I live in Washington, D.C.'s Capitol Hill neighborhood. I can more or less roll out of bed into the House of Representatives or the Senate; the majestic Library of Congress doubles as my local branch. (If you visit, spend a sunset on the steps of the library's Jefferson Building. Trust me.) You can't miss my place, three stories of brick painted Big Bird yellow. It's a charming little corner of the city. Each fall, the trees outside my window shake their leaves and carpet the street in gold. Nora Ephron, if she were alive, might've shot a scene for her latest movie in one of the lush green parks that bookend my block. The neighborhood wasn't always so nice. A few years back, during a reporting trip to China, I met an American consultant who had known Capitol Hill in a darker era. "I was driving up the street one time," he told me, "and walking in the opposite direction was this huge guy carrying an assault rifle. Broad daylight, no one even noticed. That's what kind of neighborhood it was." Nowadays, row houses around me sell for $1 million or more. I rent.
  • Washington's a fun place to live if you're young and employed. But as a recent Washington Post story pointed out, the nation's capital is slowly pricing out even its yuppies who, in their late-twenties and early-thirties, want to start families but can't afford it. "I hate to say it, but the facts show that the D.C. market is for people who are single and relatively affluent," a real estate researcher told the Post. The District's housing boom just won't stop; off go those new and expecting parents to the suburbs. And we're talking about the lucky ones. Elsewhere in the country, vulnerability in the housing market isn't a trend story; it's the norm. The Cedillo family, as Laura Gottesdiener writes today, went looking for their version of the American housing dream and thought they found it in Chandler, Arizona. They didn't know that the house they chose to rent rested on a shaky foundation -- not physically but financially. It had been one of thousands snapped up and rented out by massive investment firms making a killing in the wake of the housing collapse. As Gottesdiener -- who has put the new rental empires of private equity firms on the map for TomDispatch -- shows, the goal of such companies is to squeeze every dime of profit from their properties, from homes like the Cedillos', and that can lead to tragedy.
  • Drowning in Profits A Private Equity Firm, a Missing Pool Fence, and the Price of a Child’s Death By Laura Gottesdiener
  • ...4 more annotations...
  • Security is a slippery idea these days -- especially when it comes to homes and neighborhoods. Perhaps the most controversial development in America’s housing “recovery” is the role played by large private equity firms. In recent years, they have bought up more than 200,000 mostly foreclosed houses nationwide and turned them into rental empires. In the finance and real estate worlds, this development has won praise for helping to raise home values and creating a new financial product known as a “rental-backed security.” Many economists and housing advocates, however, have blasted this new model as a way for Wall Street to capitalize on an economic crisis by essentially pushing families out of their homes, then turning around and renting those houses back to them. Caught in the crosshairs are tens of thousands of families now living in these private equity-owned homes.
  • The same month that the family rented the house at 1471 West Camino Court, Progress Residential purchased more homes in Maricopa Country than any other institutional buyer. Nationally, Blackstone, a private equity giant, has been the leading purchaser of single-family homes, spending upwards of $8 billion between 2012 and 2014 to purchase 43,000 homes in about a dozen cities. However, in May 2013, according to Michael Orr, director of the Center for Real Estate Theory and Practice at the W. P. Carey School of Business at Arizona State University, Progress Residential bought nearly 200 houses, surpassing Blackstone's buying rate that month in the Phoenix area. The condition and code compliance of these houses varies and is rarely known at the time of the purchase. Mike Anderson, who works for a bidding service contracted by Progress Residential and other private equity giants to buy houses at auctions, was sometimes asked to go out and look at the homes. But with the staggering buying rate -- up to 15 houses a day at the peak -- he couldn’t keep up. “There’d be too many, you couldn’t go out and look at them,” he said. “It’s just a gamble. You never know what you’ve got into.”
  • Global private equity firms have not been, historically, in the business of dealing with pool fences and the other hassles of maintaining single-family houses. But following the housing market collapse, the idea of buying a ton of these foreclosed properties suddenly made sense, at least to investors. Such private-equity purchases were to make money in three ways: buying cheap and waiting for the houses to gain value as the market bounced back; renting them out and collecting monthly rental payments; and promoting a financial product known as “rental-backed securities,” similar to the infamous mortgage-backed securities that triggered the housing meltdown of 2007-2008. Even though the buying of the private equity firms has finally slowed, economists (including those at the Federal Reserve) have expressed concern about the possibility that someday those rental-backed securities could even destabilize -- translation: crash -- the broader market.
  • ince Wall Street was overwhelmingly responsible for the original collapse of the housing market, many have characterized these new purchases as a land grab. In many ways, Progress CEO Donald Mullen is the poster-child for this argument. An investment banker who enjoyed a brief flurry of fame after losing a bidding war to Alec Baldwin at an art auction, he was the leader of a team at Goldman Sachs that orchestrated an infamous bet against the housing market. Known as “the big short,” it allowed that company to make “some serious money“ when the economy melted down, according to Mullen’s own emails. (They were released by the Senate Permanent Subcommittee on Investigations in 2010.) As Kevin Roose of New York magazine has written, “A guy whose most famous trade was a successful bet on the full-scale implosion of the housing market is now swooping in to pick up the pieces on the other end.”
Paul Merrell

Speech Recognition is NSA's Best-Kept Open Secret - The Intercept - 0 views

  • Siri can understand what you say. Google can take dictation. Even your new smart TV is taking verbal orders. So is there any doubt the National Security Agency has the ability to translate spoken words into text? But precisely when the NSA does it, with which calls, and how often, is a well-guarded secret. It’s not surprising that the NSA isn’t talking about it. But oddly enough, neither is anyone else: Over the years, there’s been almost no public discussion of the NSA’s use of automated speech recognition.
  • Siri can understand what you say. Google can take dictation. Even your new smart TV is taking verbal orders. So is there any doubt the National Security Agency has the ability to translate spoken words into text? But precisely when the NSA does it, with which calls, and how often, is a well-guarded secret. It’s not surprising that the NSA isn’t talking about it. But oddly enough, neither is anyone else: Over the years, there’s been almost no public discussion of the NSA’s use of automated speech recognition. One minor exception was in 1999, when a young Australian cryptographer named Julian Assange stumbled across an NSA patent that mentioned “machine transcribed speech.”
  • One minor exception was in 1999, when a young Australian cryptographer named Julian Assange stumbled across an NSA patent that mentioned “machine transcribed speech.” Assange, who went on to found WikiLeaks, said at the time: “This patent should worry people. Everyone’s overseas phone calls are or may soon be tapped, transcribed and archived in the bowels of an unaccountable foreign spy agency.” The most comprehensive post-Snowden descriptions of NSA’s surveillance programs are strangely silent when it comes to speech recognition. The report from the President’s Review Group on Intelligence and Communications Technologies doesn’t mention it, and neither does the October 2011 FISA Court ruling, or the detailed reports from the Privacy and Civil Liberties Oversight Board.
  • ...3 more annotations...
  • There is some mention of speech recognition in the “Black Budget” submitted to Congress each year. But there’s no clear sign that anybody on the Hill has ever really noticed. As The Intercept reported on Tuesday, items from the Snowden archive document the widespread use of automated speech recognition by the NSA. The strategic advantage, invasive potential and policy implications of being able to turn spoken words into text are not trivial: Suddenly, voice conversations, historically considered ephemeral and unsearchable, can be scanned, catalogued and archived — not perfectly, but well enough to dramatically increase the effective scope of eavesdropping. Former senior NSA executive turned whistleblower Thomas Drake, who’s seen NSA’s automated speech recognition at work, says the silence is telling.
  • “You’re seeing a black hole,” Drake told The Intercept. “That means there’s something there that’s really significant. You’re seeing some of the fuzzy contours of this whole other program.”
  • Senator Ron Wyden, D-Ore., arguably the foremost congressional critic of NSA overreach, wouldn’t comment directly on the question of speech recognition. But, he said through a spokesperson: “After 14 years on the Intelligence Committee, I’ve learned that senators must be constantly on the lookout for secret interpretations of the law and advances in surveillance that Congress isn’t aware of.” He added: “For centuries, individual privacy was protected in part by the limited resources of governments. It simply wasn’t possible for governments to secretly collect information on every single citizen without investing in massive networks of spies and informants. But in the 21st century mass surveillance is no longer difficult and expensive — it’s increasingly cheap and easy. The only privacy protections that will matter in the future are the ones that are written into law and defended by public demand for freedom and openness.”
  •  
    A "black hole" at the NSA? Voice-to-text is indeed an ultra-powerful intelligence tool, but only if you are gathering verbal conversations. As content, verbal conversations should be off-limits without a court order. But is NSA honoring that limitation? And is the FISA Court enforcing it?
Paul Merrell

US military denied treatment to soldiers exposed to chemical weapons in Iraq (+video) - CSMonitor.com - 0 views

  • The New York Times's C.J. Chivers has dropped a bombshell of a scoop that details 17 US troops and seven Iraqi policemen who were exposed to old chemical weapons in Iraq, some of whom were declined appropriate medical care and service awards on the grounds of secrecy.If Mr. Chivers' reporting holds up – and there's little reason to doubt his deeply-reported piece – this is a scandal that eclipses long waits and poor funding at VA hospitals in the US. Sure, far fewer people were affected by exposure to mustard agents or sarin in Iraq, but these allegations represent enormous callousness and a direct breach of trust with soldiers.
  • Jarrod L. Taylor, a former Army sergeant on hand for the destruction of mustard shells that burned two soldiers in his infantry company, joked of “wounds that never happened” from “that stuff that didn’t exist.” The public, he said, was misled for a decade. “I love it when I hear, ‘Oh there weren’t any chemical weapons in Iraq,’” he said. “There were plenty.” That chemical weapons from before the first Gulf War remained in Iraq was an operating assumption at the time the US invaded the country in 2003 and was established fact by the end of that year. But, while the US made the search for evidence of ongoing chemical, nuclear, and biological weapons programs a priority (it failed to find any), disposing of whatever they did find apparently was not.
  • The American government withheld word about its discoveries even from troops it sent into harm’s way and from military doctors. The government’s secrecy, victims and participants said, prevented troops in some of the war’s most dangerous jobs from receiving proper medical care and official recognition of their wounds. “I felt more like a guinea pig than a wounded soldier,” said a former Army sergeant who suffered mustard burns in 2007 and was denied hospital treatment and medical evacuation to the United States despite requests from his commander. Congress, too, was only partly informed, while troops and officers were instructed to be silent or give deceptive accounts of what they had found. “ 'Nothing of significance’ is what I was ordered to say,” said Jarrod Lampier, a recently retired Army major who was present for the largest chemical weapons discovery of the war: more than 2,400 nerve-agent rockets unearthed in 2006 at a former Republican Guard compound.
  • ...3 more annotations...
  • That's the central issue in Chivers' piece, which is hard to read in full without mounting anger. But the following four graphs contain the nut of the scandal here, as I see it (emphasis mine): 
  • In the first year of the US-led war, the military didn't have the manpower to secure all of the hundreds of conventional weapons bunkers that littered the country. The shells, RPGs, and rifles that were looted from these bunkers were put to use by the then-growing Iraqi insurgency to attack both foreign soldiers and the new government in Baghdad.Chivers' story details how as late as 2008, US soldiers were involved in the secret destruction of chemical weapons in ways that violate the protocols set out in the United Nations's Convention on Chemical Weapons. The lax US approach appears to have led to the exposure of the soldiers – and it left behind an unknown quantity of old chemical weapons, some possibly in the hands of anti-government insurgents like the so-called Islamic State. The US knew it was leaving old chemical weapons behind when soldiers withdrew from the country at the end of 2011. Neither the Bush nor the Obama administrations had ever made their destruction a priority. 
  • Much of the reaction to the story has missed the central point, distracted by partisan finger pointing. Fox News predictably frames the story as "There were chemical weapons in Iraq after all." No. This is not news – and the possible existence of old sarin and mustard agent shells inside the country was not the reason that the Bush administration presented for going to war. Folks on the left have focused on the fact that these old chemical weapons were US "designed." That isn't really news either (nor that the US was notably silent about Saddam Hussein's use of chemical weapons during the Iran-Iraq war).The story is an enormous breach of trust between the US and its own soldiers. It starts with the officers and the members of the Bush administration involved, whose names the story doesn't give.
Paul Merrell

Ford White House Altered Rockefeller Commission Report - 0 views

  • Gerald Ford White House Altered Rockefeller Commission Report in 1975; Removed Section on CIA Assassination Plots White House Aide Dick Cheney Spearheaded Editing of Report to Dampen Impact New Documents Cast Further Doubt on Commission’s Investigation, Independence
  • The Gerald Ford White House significantly altered the final report of the supposedly independent 1975 Rockefeller Commission investigating CIA domestic activities, over the objections of senior Commission staff, according to internal White House and Commission documents posted today by the National Security Archive at The George Washington University (www.nsarchive.org). The changes included removal of an entire 86-page section on CIA assassination plots and numerous edits to the report by then-deputy White House Chief of Staff Richard Cheney.  Today’s posting includes the entire suppressed section on assassination attempts, Cheney’s handwritten marginal notes, staff memos warning of the fallout of deleting the controversial section, and White House strategies for presenting the edited report to the public. The documents show that the leadership of the presidentially-appointed commission deliberately curtailed the investigation and ceded its independence to White House political operatives. This evidence has been lying ignored in government vaults for decades. Much of the work of securing release of the records was done by the John F. Kennedy Assassinations Records Board in the 1990s, and the documents were located at the National Archives and Records Administration at College Park, Maryland; or at the Gerald R. Ford Library in Ann Arbor, Michigan. Additional mandatory declassification review requests filed by Archive fellow John Prados returned identical versions of documents, indicating the CIA is not willing to permit the public to see any more of the assassinations story than we show here. The documents in this set have yet to be incorporated into standard accounts of the events of this period.
  • Among the highlights of today’s posting: White House officials of the Ford administration attempted to keep a presidential review panel—the Rockefeller Commission—from investigating reports of CIA planning for assassinations abroad. Ford administration officials suppressed the Rockefeller Commission’s actual report on CIA assassination plots. Richard Cheney, then the deputy assistant to the president, edited the report of the Rockefeller Commission from inside the Ford White House, stripping the report of its independent character. The Rockefeller Commission remained silent on this manipulation. Rockefeller Commission lawyers and public relations officials warned of the damage that would be done to the credibility of the entire investigation by avoiding the subject of assassinations. President Ford passed investigative materials concerning assassinations along to the Church Committee of the United States Senate and then attempted—but failed—to suppress the Church Committee’s report as well. The White House markup of the Rockefeller Commission report used the secrecy of the CIA budget as an example of excesses and recommended Congress consider making agency spending public to some degree.
Gary Edwards

A history of the Mortgage - Housing dilemma by Arnold Kling | EconLog | Library of Economics and Liberty - 0 views

  • Method A suffered a breakdown in the 1970's, because inflation was allowed to get out of control. The 6 percent mortgage interest rates that were commonly charged by savings and loans became untenable when inflation and interest rates soared to double-digit levels. The savings and loan industry went out of business. Whether Method B could survive a similar shock is unclear. The right lesson to learn from the 1970's was not that we should use Method B. The right lesson to learn is that we should not let inflation get out of hand.
    • Gary Edwards
       
      Government inflation (thank you Jimmy Carter) as the cause of the savings and loan collapse!
  • The secondary mortgage market began in 1968, when the United States formed the Government National Mortgage Association (GNMA). GNMA pooled loans originated under programs by the Federal Housing Administration (FHA) and the Veterans Administration (VA) and sold these pools to investors. The purpose of this, as with the quasi-privatization of the Federal National Mortgage Association (Fannie Mae) that took place that year, was to take Federally guaranteed mortgage loans off of the books. President Johnson, fighting an unpopular war in Vietnam, wanted to save himself the embarrassment of having to come to Congress to ask for larger and larger increases in the ceiling on the national debt. Thus, the first steps toward mortgage securitization were taken in order to disguise financial reality using accounting gimmicks. It has been the same ever since.
    • Gary Edwards
       
      There it is, in all it'snaked glory. The government created the secondary mortgage market, spinning up Fannie, Freddie and Ginnie for the purpose of taking federally subsidized and guaranteed mortgages off the the official government books. hence the quasi-gov orgs. It's an accounting gimmick!!!!
  •  
    Excellent study of how we got into this problem that the socialist are now using to kill forever the American Dream: "..... Forty years ago, depository institutions handled mortgage credit risk very differently than they do today. Back then, the depository institution, which was typically a savings and loan association, held mortgages that were underwritten by its own employees, given to borrowers and backed by homes in its own community. These were almost always 30-year, fixed-rate loans, with borrowers having made a significant down payment, often 20 percent of the price of the home. Call this approach to mortgage lending "Method A." Today, mortgage loans held by depository institutions are often in the form of securities. These securities are backed by loans originated in distant communities by unknown borrowers, underwritten by mortgage brokers or other personnel not employed by the depository institution. The loans are often not 30-year fixed-rate loans, and the borrowers have typically made down payments of 5 percent or less, including loans with no down payment at all. Call this approach to mortgage lending "Method B." If you compare the two methods using common sense, then Method B does not pass a simple sanity check. In fact, the current financial crisis consists of banks that are up to their necks in Method B......"
Gary Edwards

The Ruling Class Consensus On Domestic Spying | Online Library of Law and Liberty - 0 views

  • This means that the US government’s vast apparatus is almost completely useless against serious terrorists or criminals, and useful primarily to do whatever the government might choose to innocent persons.
    • Gary Edwards
       
      Bold statement, but then how did the Fort Hood massacre and Boston Marathon massacre occur?  Plenty of email and phone call evidence in both cases.  Yet the government was caught totally unaware.  I guess it really depends on who the watchers are watching.  Proof is slowly being gathered that the watchers are watching those whom the government elites seek to destroy through blackmail, intimidation (IRS anyone?), and breach of Constitutional rights (take your pick of any three letter government agency acronym you like).
  • Ever since the 1970s, the art of code-making has surpassed the art of code-breaking – period.
  • Hence, on the high end, anyone can purchase voice and internet communications software that are beyond the capacity of anyone to access without an electronic key.
  • ...13 more annotations...
  • If collection is universal, the collectors don’t have to explain to others (or even to themselves) why they are targeting this person or group and not another. Possessing the data in secret, they can then decide in secret who they are really interested in.
  • That flight from responsibility is also why, in 1978, the intelligence agencies pressed Congress to pass the Foreign Intelligence Surveillance Act (FISA), under which the agencies submit their requests for detailed targeting, in secret, to a court that decides ex parte and in secret.
  • the FISA court. But that court acts not just in secret, but ex parte – hearing only one side.
  • The relevant question about the uses of the NSA programs, then, is simply “against whom, in the broad American public, is the US government likely to turn its animus?
  • Alas, the ruling class has shown itself all too able to treat domestic opponents as public enemies. But that is another story.
  • Another, PRISM, gives access to all records of email, chat, photos, videos and file transfers from the servers of leading US internet companies.
  • From Barack Obama to Karl Rove, the ruling class is in unison: The NSA’s collection of data on virtually all Americans is essential to preventing you from “being blown to smithereens on your morning commute”
  • Project Constant Informant, which tracks essentially all American phone calls, allows matching the account holder’s identity with each call’s precise location in time and place.
  • Here are the facts.
  • These programs stand between Americans and terrorists. Worries that they will be misused are misplaced or downright kooky.
  • In the words of General Keith Alexander, director of NSA, this surveillance has “helped to prevent” “dozens of terrorist events.”
  • anyone who has followed telecommunication technology and intelligence during the past three decades can only scoff at the claim that universal collection of telephone externals and access to internet traffic can thwart serious criminals or terrorists.
  • In fact, the expansion of the US government’s capacity to intrude on innocent communications happened just as technology enabled competent persons who intend to hide their communications to do so without fail.
Paul Merrell

Cash, Weapons and Surveillance: the U.S. is a Key Party to Every Israeli Attack - The Intercept - 0 views

  • The U.S. government has long lavished overwhelming aid on Israel, providing cash, weapons and surveillance technology that play a crucial role in Israel’s attacks on its neighbors. But top secret documents provided by NSA whistleblower Edward Snowden shed substantial new light on how the U.S. and its partners directly enable Israel’s military assaults – such as the one on Gaza. Over the last decade, the NSA has significantly increased the surveillance assistance it provides to its Israeli counterpart, the Israeli SIGINT National Unit (ISNU; also known as Unit 8200), including data used to monitor and target Palestinians. In many cases, the NSA and ISNU work cooperatively with the British and Canadian spy agencies, the GCHQ and CSEC. The relationship has, on at least one occasion, entailed the covert payment of a large amount of cash to Israeli operatives. Beyond their own surveillance programs, the American and British surveillance agencies rely on U.S.-supported Arab regimes, including the Jordanian monarchy and even the Palestinian Authority Security Forces, to provide vital spying services regarding Palestinian targets.
  • The new documents underscore the indispensable, direct involvement of the U.S. government and its key allies in Israeli aggression against its neighbors. That covert support is squarely at odds with the posture of helpless detachment typically adopted by Obama officials and their supporters.
  • Each time Israel attacks Gaza and massacres its trapped civilian population – at the end of 2008, in the fall of 2012, and now again this past month – the same process repeats itself in both U.S. media and government circles: the U.S. government feeds Israel the weapons it uses and steadfastly defends its aggression both publicly and at the U.N.; the U.S. Congress unanimously enacts one resolution after the next to support and enable Israel; and then American media figures pretend that the Israeli attack has nothing to do with their country, that it’s just some sort of unfortunately intractable, distant conflict between two equally intransigent foreign parties in response to which all decent Americans helplessly throw up their hands as though they bear no responsibility.
  • ...1 more annotation...
  • “The United States has been trying to broker peace in the Middle East for the past 20 years,” wrote the liberal commentator Kevin Drum in Mother Jones, last Tuesday. The following day, CNN reported that the Obama administration ”agreed to Israel’s request to resupply it with several types of ammunition … Among the items being bought are 120mm mortar rounds and 40mm ammunition for grenade launchers.” The new Snowden documents illustrate a crucial fact: Israeli aggression would be impossible without the constant, lavish support and protection of the U.S. government, which is anything but a neutral, peace-brokering party in these attacks. And the relationship between the NSA and its partners on the one hand, and the Israeli spying agency on the other, is at the center of that enabling.
  •  
    Glenn Greenwald uses Edward Snowden documents to lift the blanket of secrecy off the U.S. Dark State's carnal relationship with the Israeli apartheid government's War on Arabs, and no real surprise here, the Palestinian Authority's role as a key provider of intelligence to both Israel and the U.S. 
Paul Merrell

Bill Summary & Status - 113th Congress (2013 - 2014) - H.R.1852 - THOMAS (Library of Congress) - 0 views

  • H.R.1852 Latest Title: Email Privacy Act Sponsor: Rep Yoder, Kevin [KS-3] (introduced 5/7/2013)      Cosponsors (180) Related Bills: H.R.1847, H.R.3557, S.607 Latest Major Action: 6/14/2013 Referred to House subcommittee. Status: Referred to the Subcommittee on Crime, Terrorism, Homeland Security, and Investigations.
  •  
    Email Privacy Act, being heavily pushed by EFF and other digital privacy organizations. Ends the government's ability to obtain emails stored with a service provider without a court order. Congressional response to the Sixth Circuit's decision in U.S. v. Warshak holding that the 4th Amendment trumps the latitude granted to law enforcement to gather stored communications in the Stored Communications Act/Eelectronic Communications Privacy Act.   
‹ Previous 21 - 31 of 31
Showing 20 items per page